PA-DSS Security Implementation Guide - Image

advertisement
PA-DSS Security
Implementation Guide
i
PA-DSS Security Implementation Guide
This document applies only to Version 4.2 of Image Technology Systems’ VisualMatrix™
property management system. For a copy of the latest PA-DSS Security Implementation
Guide, contact Image Technology Systems customer support by phone, email or written
request at:
© Image Technology Systems
Phone 214.291.4000 • Fax 214.291.4007
Revision History
Name
Title
Date/Version of Update
Summary of Changes
Chet Fields
VP of Product Development
09/30/2013 – 4.2.0
PCI 1.2 to 2.0 / ReCert
Chet Fields
VP of Product Development
06/26/2012 – 3.5.3
Annual Review
Chet Fields
VP of Product Development
10/28/2011 – 3.1.2
Annual Review
Chet Fields
VP of Product Development
09/28/2010 – 2.8.1
Annual Review / ReCert
Chet Fields
VP of Product Development
12/15/2009 – 2.3.4
Annual Review
Chet Fields
VP of Product Development
11/18/2008 – 1.8.3
Annual Review
Chet Fields
VP of Product Development
12/07/2007 – 1.7.1
Initial Release
PA-QSA Assessor:
ii
Table of Contents
Revision History .........................................................................ii General Information................................................................... 5 About This Document....................................................... 5 Conventions used in this Guide ....................................... 5 PCI Overview ................................................................... 6 12 requirements of the PCI-DSS:..................................... 7 PCI-DSS Compliance and PA-DSS Validation Differences
......................................................................................... 9 VisualMatrix™ and the PCI-DSS............................................. 10 Build and Maintain a Secure Network ............................ 10 Network Requirements ........................................................................... 11 Data Protection ....................................................................................... 13 Security Administrators – Key Management .......................................... 13 Data Storage ........................................................................................... 16 Electronic Data........................................................................................ 16 Physical Data .......................................................................................... 17 Maintain a Vulnerability Management Program ............. 19 Vulnerability Testing ............................................................................... 19 Anti-Virus Software ................................................................................. 19 Implement Strong Access Control Measures ................. 20 System Access and Connectivity............................................................ 20 Account Access ...................................................................................... 21 Remote Account Access ......................................................................... 22 Administrator Account Access ................................................................ 23 Windows Server Access ......................................................................... 24 Regularly Monitor and Test Networks ............................ 28 VisualMatrix™ Security Auditing and Logging ........................................ 28 Security Auditing ..................................................................................... 28 Sensitive Data Audit ............................................................................... 30 Maintain an Information Security Policy ......................... 31 Create a Security Policy ......................................................................... 31 iii
Payment Application Data Security Standard ......................... 33 PA-DSS considerations for proper Implementation of
VisualMatrix™ in PCI-DSS compliant environments: ..... 33 Remove Historical Credit Card Data....................................................... 33 (PA-DSS 1.1.4.a) .................................................................................... 33 Sensitive Authentication Data Requires Special Handling ..................... 34 (PA-DSS 1.1.5.c) .................................................................................... 34 Purging of Cardholder Data .................................................................... 34 (PA-DSS 2.1.a) ....................................................................................... 34 Key Management Roles and Responsibilities ........................................ 35 (PA-DSS 2.5 and PA-DSS 2.6)............................................................... 35 Removal of Cryptographic Material ........................................................ 36 (PA-DSS 2.7.a) ....................................................................................... 36 Payment application enforces secure authentication credentials........... 37 Audit Trails and Centralized Logging ...................................................... 38 (PA-DSS 4.1, PA-DSS 4.3 and PA-DSS 4.4) ......................................... 38 (PA-DSS 5.4) .......................................................................................... 39 PCI-Compliant Wireless Settings............................................................ 39 (PA-DSS 6.1.b and PA-DSS 6.2.b)......................................................... 39 Never Store Cardholder Data on Internet-Accessible Systems ............. 41 (PA-DSS 9.1) .......................................................................................... 41 PCI-Compliant Remote Access Using Two-Factor Authentication......... 41 (PA-DSS 10.2) ........................................................................................ 41 Data Transport Encryption ...................................................................... 44 (PA-DSS 11.1) ........................................................................................ 44 PCI-Compliant Use of End User Messaging Technologies .................... 44 (PA-DSS 11.2) ........................................................................................ 44 Non-console Administration .................................................................... 45 (PA-DSS 12.1) ........................................................................................ 45 VPN or High Speed “Always On” Connections ....................................... 45 (PA-DSS 12.3.9) ..................................................................................... 45 Installing the VisualMatrix™ Software............................ 46 VisualMatrix™ Server Installation ........................................................... 46 VisualMatrix™ Client Installation ............................................................ 48 iv
General Information
About This Document
This document is intended as a quick reference guide to provide users with
information concerning Image Technology Systems adherence to the PCI Data
Security Standard concerning PCI-DSS compliance and VisualMatrix™ adherence
to the Payment Card Industry Data Security (PA-DSS) maintained by the PCI
Security Standards Council. This document relates specifically to Image
Technology Systems’ VisualMatrix™ software.
Conventions used in this Guide
Symbol
Title
Meaning
PCI-DSS
PA-DSS
Guidance
Provides additional guidance as to
what actions should be taken
according to PCI-DSS or PA-DSS
requirements.
Potential
Non-compliance
Pitfalls
Highlights potential problems areas,
required PCI DSS practices and/or
provides cautionary information
against potential compliance
misunderstandings and violations.
Provides additional information or
resource locations regarding an
aspect of the application, a procedure,
PCI-DSS or PA-DSS requirements.
NOTES
5
PCI Overview
The Payment Card Industry Security Standards Council was formed as a result of
collaboration between Visa, MasterCard, AMEX, Discover, and JCB to create and
standardize common payment security requirements across the entire credit card
industry. The result was a new merchant security standard called Payment Card
Industry Data Security Standard (PCI-DSS or simply referred to as “PCI”). This
multi-faceted, constantly evolving security standard includes requirements for
security management, policies, procedures, network architecture, software design
and other critical protective measures. It is intended to help organizations
proactively protect their customer account data in today’s rapidly changing internet
and computing environment.
Credit card companies are requiring compliance with PCI standards for every entity
that is involved in the storage, processing, or transmission of credit card
information.
Failure to comply can result in denial or revocation of your organization’s
ability to process credit cards. Non-compliance also places your
organization at risk of legal and/or civil consequences if credit card
information becomes compromised.
This document is being provided as a guide to assist you with becoming and
remaining PCI compliant in conjunction with your organization’s PCI-DSS
certification.
6
12 requirements of the PCI-DSS:
Build and Maintain a Secure Network
1. Install and maintain a firewall configuration to protect data
2. Do not use vendor supplied defaults for system passwords and other security
parameters
Protect Cardholder Data
3. Protect stored data
4. Encrypt transmission of cardholder data and sensitive information across public
networks
Maintain a Vulnerability Management Program
5. Use and regularly update anti-virus software
6. Develop and maintain secure systems and applications
Implement Strong Access Control Measures
7. Restrict access to data by business need-to-know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly Monitor and Test Networks
10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information Security Policy
12. Maintain a policy that addresses information security
For further information on complete merchant responsibilities under PCI-DSS
Requirements, please refer to resources available from the PCI Security Standards
Council at: https://www.pcisecuritystandards.org/index.shtml
7
PA DSS v2.0 (IMAGE TECHNOLOGY SYSTEMS’ COMPLIANCE)
VisualMatrix™, when used as designed has been certified as compliant under the
Payment Application Data Security Standard v2.0 (PA-DSS). PA-DSS v2.0 is a
security standard that applies to software vendors that develop credit card
applications for merchants. Software compliance does not automatically make you,
as a merchant, PCI compliant, but it is an important and necessary step toward
minimizing the potential for security breaches leading to compromises of sensitive
cardholder data.
8
PCI-DSS Compliance and PA-DSS Validation Differences
As a software vendor, Image Technology Systems’ (ITS) responsibility is to be “PADSS Certified”. ITS performs internal assessment and certification compliance
reviews with Datassurant our independent PA-QSA assessment firm, to ensure that
VisualMatrix™ conforms to industry best practices when handling, managing and
storing payment related information.
PA-DSS is the standard against which VisualMatrix™ is being tested, assessed,
and certified.
PCI-DSS Compliance is then later obtained by the merchant, and is an assessment
of their actual server (or hosting) environment.
While Image Technology Systems recognizes the importance of
upholding card holder data security and integrity, most if not all any
parameters of the PCI Data Security Standard and the process of
achieving and maintaining ‘PCI-DSS Compliance’ is the responsibility of
the merchant or services provider, using PCI-DSS compliant server
architecture along with proper hardware/software configurations, access control
procedures and a clearly defined Enterprise security policy covering at a minimum
all PCI-DSS applicable areas. This guide contains sections containing descriptions
for each of the 12 PCI Data Security Standard requirements; including information
explaining how VisualMatrix™ software conforms to the PCI Data Security
Standard.
The PA-DSS Certification is intended to ensure that VisualMatrix™ will help our
clients more easily meet, achieve and maintain PCI-DSS compliant environments.
9
VisualMatrix™ and the PCI-DSS
Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other
security parameters
Installation
New VisualMatrix™ installations will meet all PA DSS v2.0 compliance
requirements.
Upgrade
VisualMatrix™ revisions prior to 4.2 did not store magnetic stripe data, card
validation codes, PINs or Pin blocks and therefore secure removal is not required.
However, it will encrypt sensitive credit card information that will remain in the
database making your upgraded VisualMatrix™ account PA DSS v2.0 compliant.
Previous VisualMatrix™ Versions
VisualMatrix™ revisions prior to 4.2 will no longer be PCI compliant. Please contact
Image Technology Systems to discuss securing sensitive data on these revisions.
PCI DSS v2.0 (Merchant Compliance)
The basic requirements that a merchant must meet in order to become certified as
PCI-compliant are listed below. Use this information to develop a formalized PCI
Security Policy document for your organization. Please keep in mind that your PCI
Security Policy will be unique to your company and methods of doing business.
10
Network Requirements
Wired Network
WebLink Server Connection Requirements (if purchased separately)
•
An Image Technology Systems approved and configured WebLink Server
is required for PA-DSS compliancy in conjunction with VisualMatrix™
•
It is required that a secure connection between the VisualMatrix™
application server and the WebLink server be established and maintained
at all times
•
The WebLink Server must be contained on a separate DMZ network with a
firewall between the DMZ network and the VisualMatrix™ network. Only
ports required for the system to properly function should be open between
the WebLink server and the VisualMatrix™ application server.
•
In the event sensitive data is not encrypted between the VisualMatrix™
application server and the WebLink server, it will render the VisualMatrix™
software non-compliant.
Wireless Network
Firewall
• Install perimeter firewalls between any wireless networks and the
VisualMatrix™ Server. Configure these firewalls to deny traffic from the
wireless environment into the VisualMatrix™ Server.
•
Your wireless firewall configuration must be documented and reviewed
regularly to insure that it continues to meet PCI standards.
Connection
•
Wireless routers should automatically disable during off-hours.
•
Wireless connections should be configured to use the highest level of
encryption possible. Do not use common WEP encryption which is the
default of many wireless routers. VisualMatrix™ uses Hypertext Transfer
Protocol Secure (HTTPS) for all connections to Credit Card service
providers.
•
WEP is prohibited on new implementations after March 31, 2009
11
•
WEP is prohibited on existing implementations after June 30, 2010.
Authentication
•
For wireless environments connected to VisualMatrix™ or transmitting
cardholder data, change wireless vendor defaults, including but not limited
to default wireless encryption keys, passwords, and SNMP community
strings.
•
Ensure wireless networks transmitting cardholder data or connected to
VisualMatrix™ use industry best practices (for example, IEEE 802.11i) to
implement strong encryption for authentication and transmission.
•
Do not use vendor supplied default passwords and security parameters on
wireless network devices.
•
All Wireless Network device passwords and encryption keys must be
changed immediately when a user with knowledge of the passwords and/or
keys leaves the company or changes positions within the company.
Firewall
In accordance with PCI-DSS v2.0 and industry best practices; Image
Technology Systems strongly recommends that:
•
All systems containing sensitive information (servers, databases, wireless
access points, etc.) reside behind a firewall in order to protect that data
as well as meet PCI-DSS requirements.
•
No services not related to the VisualMatrix™ installation should be
utilized on the VisualMatrix™ Server.
•
Your entire network must be protected with a firewall configured to deny
all traffic except that which you expressly need and permit in order for
your business to function.
o Required ports are 7000/TCP, 445/TCP, and Windows File and
Printer Sharing ports. Depending on SQL configuration, a
separate port for SQL may be required.
12
•
•
Your firewall configuration must be documented and reviewed regularly
to insure that it continues to meet PCI standards.
Personal Computers, PDAs, Pocket PCs, laptops and any other devices
that use remote-access technologies to access the VisualMatrix™ Server
require the installation of a personal firewall directly on the device.
Protect Cardholder Data
Protect stored cardholder data
Encrypt transmission of cardholder data across open, public networks
Data Protection
Operating System Security ‘Hardening’
•
The operating system needs to be ‘Hardened’ in order to remediate
security vulnerabilities
•
For detailed information regarding operating system Hardening, please
refer to Microsoft documentation for Windows. Information is also
available at www.microsoft.com
•
Ports should only be enabled that are needed for your specific
communication needs
•
Windows operating systems should only have services installed that are
specifically utilized
•
Failing to harden all operating systems utilized for VisualMatrix™ will
render the software non-compliant
Security Administrators – Key Management
Assignment
•
Key employees in your organization should be given the ability to
configure and maintain your encryption settings, change passwords and
13
secure encryption keys. These employees will be known as Security
Administrators.
•
Restrict key access to the fewest number of Security Administrators
necessary. A minimum of 2 Security Administrators should be assigned,
both a primary and secondary.
•
It is essential that at least 1 Security Administrator be available at all
times. Vacation and holidays should be scheduled based on the
availability of one Administrator.
Compliance
•
The Security Administrators must be familiar with every aspect of your
PCI Security Policy and your policies must insure their compliance.
•
Require that each Security Administrator sign a form detailing the
responsibilities you have assigned them while creating your PCI Security
Policy.
•
Deletion of a master key, whether needed because of a compromised
key or a database upgrade, must be done securely. In order to
accomplish this, you must execute the “SDELETE” command for
Windows servers. Extreme caution should be exercised when using
either command as they PERMANENTLY remove data from your hard
drive.
Security Administrator – Key Custodian Form requirements
As part of PCI-DSS compliant key management practices, merchants are
required to have an internal key custodian and that the key custodian sign a
form (which can be created in-house) simply agreeing or attesting that they
understand and accept their data security and encryption key custodian
responsibilities.
The following list provides sample items from which system owners /
administrators can develop a key custodial agreement form for authorized
members of their merchant organization. The custodial agreement should
indicate:
•
That Security Administrators authorized to administer VisualMatrix™
encryption keys (a.k.a. ‘key custodians’) are required to sign the
14
•
•
•
agreement document as a condition of employment with the merchant
organization and to indicate acceptance of custodial responsibilities.
That the key custodian is in employment with the merchant
organization on the date signed
That the key custodian has been provided access to VisualMatrix™
system security components (software, key-files, equipment,
documentation, passwords) and agrees that, he or she:
o Understand that cryptographic encryption keys and information
relating to the merchant organization’s PCI security
infrastructure and cryptographic controls are most sensitive to
the company.
o Has read and understood the merchant organization’s
information security policies and agrees to comply with those
policies to the best of their ability (see PCI DSS Req.12)
o Understands that non-compliance with the merchant
organization’s information security policies can lead to
disciplinary and/or legal action.
o Understands that exceptions to compliance will only occur
where compliance would violate local, state, or federal law, or
where a senior officer of the merchant organization or law
enforcement officer has given prior authorization.
o Agrees never to divulge any key management or related
security system passwords, processes, security hardware or
secrets associated with the merchant organization’s systems to
any third party, including other key custodians, unless
authorized by a senior officer of the merchant organization or
required to do so by law enforcement officers.
Agrees to report promptly and in full to the correct merchant
organization personnel, any suspicious activity, including but not
limited to key compromise or suspected key compromise, and other
activity which can include:
o Indications of unauthorized system use or access.
o Phone, email, text, or other message requests from
unidentified sources requesting access to secure systems or
information.
o Unidentifiable files or applications found on systems in the
cardholder data environment.
o Unusual activity recorded in log files.
15
o That the key custodian has been given the ability to raise
questions about the agreement and has had those questions
answered satisfactory.
o That the custodian agrees to all points and understands an
original copy of the agreement will be held on their personnel
record and kept by the merchant organization for an indefinite
period.
o That the agreement is dated, with the custodian’s name printed
& signed, and was witnessed by a senior officer of the
merchant organization.
Data Storage
Card holder data handling
• Cardholder data must be stored on a computer that is segregated from
the rest of your network and from public access. Thus, your
VisualMatrix™ database cannot be located on the same server that hosts
email, websites or any other network related functions.
•
The VisualMatrix™ data server should never have direct internet
connectivity or be assigned a public IP Address.
Electronic Data
Storage
• Cardholder data that is stored or transmitted via the internet, e-mail, fax
or wireless networks must be encrypted and protected from unauthorized
access.
•
VisualMatrix™ does not allow the transmission of cardholder data via email, instant messaging or other medium.
•
All VisualMatrix™ encrypted data is stored in the SQL Server
VisualMatrix_Data.mdf file.
•
PIN numbers, Card Validation Codes and the full contents of magnetic
stripe tracks should NEVER be stored.
16
•
During the installation/certification process VisualMatrix™ will allow for
the rotation of the encryption keys for your server. These keys will be
stored on removable devices (such as USB thumb drives) one of which
will need to be installed on the server computer whenever the system is
required to decrypt credit card numbers. The remainders are to be stored
in a secure location (both on and off premises). A limited number of
Customer employees will have access to the file contents.
Retention
•
Data should not be stored longer than is strictly necessary. Cardholder
data that exceeds the customer-defined retention setting will be purged
during the Night Audit process.
Access
•
You should grant permission to select users so they can view stored
cardholder data. The number of users with access should be strictly
limited.
•
There is never a need for the Image Technology Systems support
technician to extract or remove any sensitive data such as Track Data,
CVV, Pin or Pin Block data from a client’s server for troubleshooting or
testing. Therefore, this data is never returned to Image Technology
Systems.
Logs
•
Access logs for cardholder data should be reviewed and maintained for
an indefinite time period.
Physical Data
Storage
•
Handwritten cardholder data, encryption keys or encryption passwords
must be stored in a secure, supervised area.
•
Give consideration to alarm systems and security cameras.
•
PIN numbers, Card Validation Codes, full unencrypted card numbers and
the full contents of magnetic stripe tracks should NEVER be stored.
Retention
17
•
Inspect your paper files and remove any sensitive data that should not be
stored during your compliance procedure. (PIN numbers, etc.).
•
Physical copies of sensitive data should adhere to the same retention
policies as electronic data. When no longer necessary for stated
business purposes documents containing cardholder information should
be shredded or otherwise destroyed.
Access
•
You should grant permission to select users so they can view physical
cardholder data. The number of users with access should be strictly
limited.
•
Limit physical access to secure areas where data is stored.
•
There is never a need for the Image Technology Systems support
technician to extract or remove any sensitive data such as Track Data,
CVV Pin or Pin Block data from a client’s server for troubleshooting or
testing. Therefore, this data is never returned to Image Technology
Systems.
Backup Media
Storage
•
Backup media should be stored in a secure, supervised area both on and
offsite.
Retention
•
Backup media should adhere to the same retention policies as electronic
data. When no longer necessary the media should be overwritten or
destroyed.
Access
•
You should grant permission to select users so they can view physical
cardholder data. The number of users with access should be strictly
limited.
•
Limit physical access to secure areas where backup media is stored both
on and offsite.
18
Maintain a Vulnerability Management Program
Develop and maintain secure systems and applications
Use and regularly update anti-virus software
Vulnerability Testing
•
Good security practices must include testing to identify potential
vulnerabilities and develop appropriate safeguards. PCI standards
require that you perform an external vulnerability scan by a qualified
vendor at least quarterly. Results of the scan must be submitted to the
PCI Security Standards Council. Approved Scanning Vendors (ASVs)
are listed on the PCI Security Standards Council website.
Anti-Virus Software
•
Anti-Virus software should be deployed to protect your network and each
computer that connects to it against spyware, malware, worms, Trojans
and any other malicious software that may attack your network
environment.
•
Your anti-virus software and Windows Operating System software should
be updated frequently to insure that your protection is always current.
•
Logs generated by your anti-virus software and Windows should be
reviewed on a regular basis.
For further information on using antivirus use, and for complete merchant
responsibilities under PCI DSS Requirement 5, please refer to resources available
from the PCI Security Standards Council at:
https://www.pcisecuritystandards.org/index.shtml
19
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
System Access and Connectivity
•
You must use secure encryption transmission technology such as IPsec,
SSH, VPN or SSL V3 / TLS V1 for transmitting sensitive data over public
networks.
•
An IPsec, SSH, VPN or SSL V3 / TLS V1 connection is required for any
non-console administrative access such as RDP.
•
VisualMatrix™ Administrative access is handled using secure VNC
tunnels with one-time encryption (RSA/AES) and single-use access
tokens. One-time encrypted VNC packages are deployed upon token
validation, and destroyed when no longer in use. All VisualMatrix™
Administrative access is logged both in the VisualMatrix™ application
and in the remote administrative tools.
•
Multi-site implementations require the use of a closed VPN or SSH tunnel
that restricts connections between untrusted networks and any system
components in the cardholder data environment. Failure to do so is in
violation of PCI-DSS v2.0.
•
VisualMatrix™ VPN access must be disabled when not in use. If you
request assistance a VisualMatrix™ Customer Service technician will
contact you to have access enabled.
Authentication
•
Do not use vendor supplied default passwords and security parameters
on network devices. Device passwords require 7 or more characters with
a combination of letters, numbers and symbols and should be changed
every 90 days.
•
All Firewall device passwords and encryption keys must be changed
immediately when a user with knowledge of the passwords and/or keys
leaves the company or changes positions within the company.
20
•
VisualMatrix™ does not use, nor interfere, with two-factor authentication
systems that require a username & password combination and an
additional authentication item such as a smart card or pin number.
•
Client use of remote access technologies (Terminal Server, Citrix, etc.) to
access VisualMatrix™ requires the use of two-factor authentication.
Account Access
Internal Account Access
Login
•
Access to all PCs, servers and databases with payment applications
require a unique user ID and secure authentication.
•
Assign all users a unique ID before allowing them to access system
components or cardholder data.
Authentication
•
In addition to assigning a unique ID, employ at least one of the following
methods to authenticate all users: Password, Passphrase or Two-factor
authentication.
21
Remote Account Access
Login
•
Assign all users a unique ID before allowing them to access systems
components or cardholder data.
•
Limit repeated passwords attempts by locking the user ID after not more
than six attempts.
•
Set the lockout duration to a minimum of 30 minutes or until an
administrator enables the user ID.
•
If a session has been idle for more than 15 minutes, require the user to
re-enter the password to reactivate the terminal.
•
Users must login at least twice. Once for Work Station OS authentication
and once for running VisualMatrix™.
•
Limit user login times to the specific hours when they should have access
to the system.
•
Limit user system access to include only resources that are required for
their job duties.
•
When a user no longer needs system access their account should be
disabled and maintained on the system. When/if the user returns the
account can be enabled and used again, maintaining a complete history
of the users’ activity.
•
Changing VisualMatrix™ installation settings for unique user IDs and
secure authentication will result in non-compliance with PCI-DSS v1.04
Authentication
•
In addition to assigning a unique ID the user requires an authentication
password.
•
Incorporate two-factor authentication for remote access (network-level
access originating from outside the network).
•
Render all passwords unreadable during transmission and storage on all
system components using strong cryptography.
22
•
Ensure proper user authentication and password management for nonconsumer users and administrators on all system components.
•
Do not use group, shared, or generic accounts and passwords.
•
Change user password at least every 90 days.
•
Require a minimum password length of at least 7 characters.
•
Use passwords containing both numeric and alpha characters.
•
Do not allow a user to submit a new password that is the same as any of
the last four passwords he or she has used.
•
If a user forgets a password, the Administrator should require that the
password be changed on the users’ next login attempt. Administrators
should not have access to other users’ passwords. Passwords should
never be transmitted via e-mail or the internet.
•
It is the client’s responsibility to track and manage passwords for
VisualMatrix™ login. When contacted by a VisualMatrix™ Customer
Service Technician the client must enable remote access and provide the
technician with a password that meets all Authentication requirements.
Administrator Account Access
Login
•
Limit repeated passwords attempts by locking the user ID after not more
than six attempts.
•
Set the lockout duration to a minimum of 30 minutes or until Administrator
enables the user ID.
•
If a session has been idle for more than 15 minutes, require the user to
re-enter the password to reactivate the terminal.
•
When an Administrator no longer needs system access their account
should be disabled and maintained on the system. When/if the
Administrator returns the account can be enabled and used again,
maintaining a complete history of the users’ activity.
23
Authentication
•
Do not use group, shared, or generic accounts and passwords.
•
Change Administrator passwords at least every 90 days.
•
Require a minimum password length of at least 7 characters.
•
Use passwords containing both alpha and numeric characters.
•
Do not allow an Administrator to submit a new password that is the same
as any of the last four passwords her or she used.
•
If an Administrator forgets a password, they should be required to change
their password on the next login attempt. Administrators should not have
access to other users’ passwords.
•
ECL access should always have a complex password. This password
must be changed every 90 days.
•
Passwords should never be transmitted via e-mail or the internet.
•
It is the client’s responsibility to track and manage passwords for
VisualMatrix™ Administrative login. When contacted by a VisualMatrix™
Customer Service Technician the client must enable remote access and
provide the technician with an Administrative password that meets all
Authentication requirements.
Windows Server Access
Remote Desktop Access
Connection
•
Create unique connection usernames and passwords for each user who
will access the Server via Remote Desktop.
•
Change default settings in remote access software (default passwords
and default connection port).
•
Allow connections from only specific (known) IP/MAC addresses.
•
Allow RDP connections only via a Virtual Private Network (VPN) on the
firewall.
24
•
Enable encrypted data transmission according to PCI DSS requirement
4.1.
•
Enable account lockout after a certain number of failed login attempts
according to PCI DSS Requirement 8.5.13.
•
Enable all Remote Desktop logging features.
Login
•
Assign all users a unique ID before allowing them to access systems
components or cardholder data.
•
Limit repeated passwords attempts by locking the user ID after not more
than six attempts.
•
Set the lockout duration to a minimum of 30 minutes or until Administrator
enables the user ID.
•
If a session has been idle for more than 15 minutes, require the user to
re-enter the password to reactivate the terminal.
•
When an Administrator no longer needs system access their account
should be disabled and maintained on the system. When/if the
Administrator returns the account can be enabled and used again,
maintaining a complete history of the users’ activity.
•
Restrict access to customer passwords to authorized reseller/integrator
personnel.
•
VisualMatrix™ Administrative user access must be disabled when not in
use. If you request assistance a VisualMatrix™ Customer Service
technician will contact you to have access enabled.
Authentication
•
Do not use group, shared, or generic accounts and passwords.
•
Change Administrator passwords at least every 90 days.
•
Require a minimum password length of at least 7 characters.
•
Use passwords containing both alpha and numeric characters.
25
•
Do not allow an Administrator to submit a new password that is the same
as any of the last four passwords her or she used.
•
If an Administrator forgets a password, they should be required to change
their password on the next login attempt.
•
Administrators should not have access to other users’ passwords
•
ECL access should always have a complex password. This password
must be changed every 90 days.
•
Passwords should never be transmitted via e-mail or the internet.
•
Incorporate two-factor authentication for remote access (network-level
access originating from outside the network) to the network by
employees, administrators, and third parties. Use technology such as
remote authentication and dial-in service (RADIUS); terminal access
controller access control system (TACACS) with tokens; or VPN/SSH
(based on SSL V3 / TLS V1 or IPsec) with individual certificates.
•
It is the client’s responsibility to track and manage passwords for
VisualMatrix™ Administrative login. When contacted by a VisualMatrix™
Customer Service Technician the client must enable remote access and
provide the technician with an Administrative password that meets all
Authentication requirements.
Administration
•
Assign all users a unique ID before allowing them to access systems
components or cardholder data.
•
In addition to assigning a unique ID, employ at least one of the following
methods to authenticate all users: Password or passphrase or two-factor
authentication.
•
Render all passwords unreadable during transmission and storage on all
system components using strong cryptography.
•
Ensure proper user authentication and password management for nonconsumer users and administrators on all system components as follows:
26
o Control addition, deletion and modification of user IDs, credentials,
and other identifier objects.
o Verify user identity before performing password resets.
o Set first-time passwords to a unique value for each user and
change immediately after the first use.
o Immediately revoke access for any terminated users.
o Remove/disable inactive user accounts at least every 90 days.
o Enable accounts used by vendors for remote maintenance only
during the time period needed.
o Communicate password procedures and policies to all users who
have access to cardholder data.
o Do not use group, shared, or generic accounts and passwords.
o Change user passwords at least every 90 days.
o Require a minimum password length of at least seven characters.
o Use passwords containing both numeric and alphabetic
characters.
o Do not allow an individual to submit a new password that is the
same as any of the last four passwords he or she has used.
o Limit repeated access attempts by locking out the user ID after not
more than six attempts.
o Set the lockout duration to a minimum of 30 minutes or until
administrator enables the user ID.
o If a session has been idle for more than 15 minutes, require the
user to re-enter the password to reactivate the terminal.
o Authenticate call access to any database containing cardholder
data. This includes access by applications, administrators, and all
other users.
27
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
VisualMatrix™ Security Auditing and Logging
Overview
The VisualMatrix™ product provides both access security as well as an audit
trail of activity performed by a user. In the case of security, access requires
the entry of an ID as well as a password. The VisualMatrix™ application
requires use of complex passwords and provides a strong level of security
as required by the Payment Card Industry for maintaining only authorized
access to sensitive data.
Since some data is sensitive by nature, such as credit card numbers, and
driver’s license numbers, this information is stored encrypted in the
database. Because of the sensitivity, this data is encrypted using strong
encryption. Any time a user who has been granted access to this data views
this information, an audit record is created for added security purposes.
There are no settings to alter the audit of this information, it is automatic and
cannot be deactivated by the System Administrator.
With these processes in place, access is restricted to authorized users
established by the System Administrator and once granted, the activity of a
user is monitored for document activity as well as settings that could affect
the operation of the software as well as changes made to records within a
file.
Security Auditing
As indicated, VisualMatrix™ provides that capability to restrict access to the
application based on the assignment of an ID and Password. In the event
that a high level of security is required, the use of Complex passwords is
strongly recommended. In fact the VisualMatrix™ software is shipped with
Complex passwords enabled.
28
The ID assigned by the System Administrator is used in conjunction with the
Complex password to grant access to the VisualMatrix™ application. To
qualify as a Complex password, the password must include the following:
•
The entry must contain a minimum of 7 characters
•
The entry must contain at least one number
•
The entry must contain at least one letter
•
The entry cannot be the same as any of the user’s last 4 passwords
•
Use strong cryptography and security protocols such as SSL V3 / TLS
V1 or IPsec to safeguard sensitive cardholder data during
transmission over open, public networks
•
Render all passwords unreadable during transmission and
storage on all system components using strong cryptography
•
Assign all users a unique ID before allowing them to access system
components or cardholder data
•
Incorporate two-factor authentication for remote access (network-level
access originating from outside the network)
•
Ensure proper user authentication and password management for
non-consumer users and administrators on all system components
•
Do not use group, shared, or generic accounts and passwords
•
Change user passwords at least every 90-days
•
Limit repeated access attempts by locking out the user ID after not
more than six attempts
•
Set the lockout duration to a minimum of 30 minutes or until
administrator enables the user ID
•
If a session has been idle for more than 15 minutes, require the
user to re-enter the password to reactivate the terminal
The use of Complex passwords is also accompanied by a setting for the
number of days the password is valid for, indicating when it will expire and
require a change of the password by the user. The default setting is 90 days
and it is strongly recommended that this setting not be changed to lengthen
the period for expiration.
During user access via the login process, the user password is validated
before access is granted to the VisualMatrix™ application. In the event that
the user’s password is within 8 days of expiration, the user will be provided
29
with the following message; “Your VisualMatrix™ password will expire in X
days” where X represents the number of days remaining before expiration.
The user can choose to change the password upon the first occurrence of
this message or any time prior to the expiration date. When choosing to
change the password, the user will be required to enter their current
password and then enter their new password based on the previously noted
criteria and also verify the new password a second time.
In the event that a user forgets their password or they believe their password
has been compromised, the System Manager can reset the password and
allow the user to create a new password at the next login.
If the user attempts access to the VisualMatrix™ application and enters an
ID/Password combination that cannot be authenticated for 6 consecutive
attempts, the user will be locked out from accessing the application for 30
minutes. The System Manager can be contacted to remove the lock and
allow the user to attempt access again, or reset the user password as noted
above.
Please note that the use of the User setting for ‘Allow Logon Pass-through’
provides a convenience for users to bypass the use of the VisualMatrix™ ID
and password. However use of this setting will render your VisualMatrix™
application to not be in compliance with the Payment Card Industry
requirements.
Any deviation from the above guidelines for secure access will render the
VisualMatrix™ software non-compliant.
Sensitive Data Audit
Specific individuals may be granted access to view the full data within the
sensitive data file for purposes required in their position within the
organization. From time to time it may be necessary to access the full credit
card number or a customer’s third party account number. Any time this
information is accessed by an individual with security clearance, an audit
record is recorded with the following information:
•
The process used to view the information
•
The customer code associated with the information
30
•
The last 4 digits of the sensitive data, not the full account number
•
The type of data viewed; credit card, third party account number, and
checking account number
•
The ID of the individual that is logged on the VisualMatrix™
application
•
The ID of the individual who has security clearance and granted
access
•
The date the information was reviewed
•
The time the information was reviewed
•
The success or failure of the attempt
The actual audit file of the sensitive data is encrypted with a sequential key
to further protect the audit file from external review. The information in the
audit file can be reviewed via a report available from the System Manager
set of menus and is entitled “Report Secured Decryption Activity”. The
report includes the information indicated above and can be selected utilizing
the following report options:
•
The user ID who requested to view the sensitive data
•
The user ID of the individual that granted access to the sensitive data
•
The customer code associated with the sensitive data
•
The type of data viewed; credit card, third party account number, and
checking account number
•
Starting date of sensitive data access attempt
•
Ending date of sensitive data access attempt
•
Attempted Access, ‘Granted’, ‘Denied’ or ‘All’
Maintain an Information Security Policy
Maintain a policy that addresses information security
Create a Security Policy
Image Technology Systems strongly advises merchants to observe their
responsibilities under PCI DSS Requirement 12 in establishing, publishing,
31
maintaining, and disseminating across the entire organization an information
security policy that:
•
Addresses all 12 PCI requirements from the merchant operation perspective.
•
Includes an annual process that identifies threats, and vulnerabilities, and
results in a formal risk assessment.
•
Includes a review at least once a year and updates to reflect changes to
business objectives or the risk environment.
•
Develops daily operational security procedures that are consistent with PCI
DSS requirements, such as user account maintenance procedures, and log
review procedures.
•
Includes usage policies for critical employee-facing technologies, such as:
o E-mail and Internet usage
o Removable electronic media, e.g. USB drives, laptops / tablets, mobile
devices, e.g. smart phones, iPods, etc.
o Wireless technologies (If applicable)
o Remote-access technologies (If applicable)
A strong Information Security Policy is not only required for PCI-DSS compliance it
also sets the security tone for the whole company and informs employees what is
expected of them. All employees should be aware of the importance in securing
sensitive data and their responsibilities for protecting it.
For further information on developing a merchant security policy, and for complete
merchant responsibilities under PCI DSS Requirement 12, please refer to
resources available from the PCI Security Standards Council at:
https://www.pcisecuritystandards.org/index.shtml
32
Payment Application Data Security Standard
PA-DSS considerations for proper Implementation of VisualMatrix™ in PCIDSS compliant environments:
Remove Historical Credit Card Data
(PA-DSS 1.1.4.a)
PA-DSS 1.1.4.a states that historical data such as magnetic stripe data,
card validation codes, PINs, or PIN blocks stored by previous versions of
the software must be securely deleted. Secure removal of this data (if
present) is absolutely necessary for PCI compliance.
After successfully upgrading from any version prior to version 1.7.1 of VisualMatrix,
the historical data must be securely deleted from both the server computer and any
other computer or network share to which this data may have been copied.
This is typically in the directory C:\ImageTech\VisualMatrix\Shared\Backup on the
server computer and also C:\ImageTech\VisualMatrix\Shared\PreUpgrade. The
Daily Backup files should be left in place as these are rotated on a weekly basis.
They have the names of VM_XXX_Pre.Dbk and VM_XXX_Post.Dbk where XXX is
the 3 character appreviation for the day of the week. These files should NOT be
deleted. However all others having ‘dbk’ extension should be deleted. Then you
can securely remove any trace of these files by following these steps.
1.
2.
3.
Quit all programs.
Click Start, click Run, type cmd, and then press ENTER.
Type cipher /W:C:\ImageTech\VisualMatrix and then press ENTER.
This process could take several minutes, depending on the size of the hard drive.
This should also be performed on any folders from any computer whose local drive
was used as a destination to which the backup files may have been copied. Also,
any CDs to which the backups were saved should be destroyed and any magnetic
media should be completely overwritten or degaussed.
These steps are necessary in order for your property to be in full PCI-DSS
compliance
33
Sensitive Authentication Data Requires Special Handling
(PA-DSS 1.1.5.c)
PA-DSS 1.1.5.c states that the following guidelines must be followed when dealing
with sensitive authentication data (swipe data, validation values or codes, PIN or
PIN block data):
•
•
•
•
•
Collect sensitive authentication data only when required to solve a specific
problem.
Store such data only in specific, known locations with limited access.
Collect only the limited amount of data required to solve a specific problem.
Encrypt sensitive authentication data while stored.
Securely delete such data immediately after use.
Before going live with the VisualMatrix software a temporary practice database is
employed, one that does not typically have the credit card interface enabled. Upon
going live this database is replaced with a fully configured one that will have the
credit card interface enabled if one was purchased). Any cardholder data
contained in the practice database (if it was enabled) will be overwritten by the live
database.
In the event that the fully configured database was used for troubleshooting prior to
going live then there is a utility that can purge all transactional data including the
encrypted credit card numbers which is the only sensitive authentication data
stored in the database. This can be done by VisualMatrix technical support staff
during the final ‘bring the system live’ procedure.
In any event the full track data and CVV data are never stored in the databases or
logs, or allowed to be configured to be stored at any time in the production
environment or when troubleshooting in the production environment. The only files
in which the encrypted cardholder data is stored is in the SQL database files
VisualMatrix_Data.mdf and VisualMatrix_Log.ldf in the \ImageTech\VisualMatrix
folder.
All log files always contain only masked PAN and Track data and cannot be
configured to store in an unmasked format. Database backups are password
protected and when needed for troubleshooting are safely downloaded to the
Image Technology Systems’ development environment, restored using the strong
password, and immediately after the issue is resolved the database is deleted.
Purging of Cardholder Data
(PA-DSS 2.1.a)
PA-DSS 2.1a states that cardholder data must be purged after it exceeds the
34
customer-defined retention period. The database is the only place VisualMatrix™
stores cardholder data. The retention settings must be set from the Security screen
accessed from the Management / Setup / Parameters tab. Any historical data that
exceeds the customer-defined retention period will be automatically removed via
the first resultant Night Audit Process.
Key Management Roles and Responsibilities
(PA-DSS 2.5 and PA-DSS 2.6)
PA-DSS 2.5 and PA-DSS 2.6 state that the payment application must implement
key management processes and protect cryptographic keys used for encryption of
cardholder data against disclosure and misuse.
Payment application must protect any keys against disclosure and
misuse
•
Sensitive credit card information is protected in VisualMatrix through the use of
encryption keys. Three USB flash drives will need to be available for use. Any size
flash drive will work as the file stored on the drive is not very large. No other data
should be stored on the drive. It should be dedicated to the encryption key. Label
the keys one, two and three. The first key we refer to as the active key and will
remain in the server computer at all times. The second key is a backup of the active
key and should be stored in a safe, secure location on site. The third key is also a
backup but should be stored in a safe, secure location off site, such as a safety
deposit box or corporate office safe.
•
If a USB flash drive is damaged utilities are available to use a backup key to create
another key so that you always have three copies of the key. In the event that all
three encryption keys are lost, you will lose access to all your credit card
information. You would not be able to process any credit cards or settle any
batches. It is also very important to understand that it will be IMPOSSIBLE even for
technical support to retrieve any of the encrypted data.
•
Any individuals that manage or have access to these keys should sign the Key
Custodian form acknowledging their responsibility to protect the keys from
disclosure and misuse. A sample of this form can be found in the file: ITS
Responsibility of Key Custodian.doc available from Image Technology Systems
technical support staff and also initially included with this document.
Implement key management processes and procedures for cryptographic
keys used for encryption of cardholder data
35
•
Initially, after installing or receiving the upgrade to Visual Matrix version 3.1 or
higher you will notice a message when you log in notifying you that the Encryption
Keys need to be changed in order to be fully PCI compliant. The message also
informs you of how many days you have left before the system locks. What that
means is if the keys are not changed before the number of days left runs out the
system will be completely locked down. You will not be able to log in or use
VisualMatrix at all.
•
Additionally, you will be required to rotate these keys at intervals as determined by
management to fulfill PCI requirements upon expiration of a crypto-period.
Expiration of a crypto-period could be upon compromise of the keys (perhaps by
the departure of an employee who had access to them) or after a time period
reasonably shorter than the time necessary to break the keys. We recommend that
the keys be rotated at least once per year. Complete instructions for this procedure
are provided online at: http://www.visualmatrixpms.com/implementation.asp.
•
Rotation of the keys overwrites the previous keys and therefore they are revoked
through replacement and once the keys are rotated the previous keys are useless
for decrypting the data encrypted with the current keys. If however, for some reason
(such as desiring to use the USB drive for some other purpose) the following
section explains how to securely delete the old keys.
Removal of Cryptographic Material
(PA-DSS 2.7.a)
PA-DSS 2.7a states that cryptographic material must be removed. Such removal is
absolutely necessary for PCI compliance.
The cryptographic keys are recommended to be stored on removable drives (i.e. USB
thumb drives). The files that contain the keys can be deleting securely by following these
steps:
1.
Make sure Cryptographic Key thumb drive is inserted into computer.
2.
Determine the Drive letter of recently inserted drive. (Example: E:)
3.
Quit all programs.
4.
Click Start, click Run, type cmd, and then press ENTER.
5.
Type del /s E:\*.* and then press ENTER, when prompted type Y then ENTER
6.
Type cipher /W:E:\ and then press ENTER.
This process could take several minutes, depending on the size of the USB thumb drive.
36
This should also be performed on any other thumb drives containing old cryptographic keys
or when desiring to use the USB drives for a purpose other than the cryptographic keys.
These steps are necessary in order for your property to be in full PCI-DSS
compliance.
Extreme caution should be exercised when using either command as they
PERMANENTLY remove data from your removable drive.
Payment application enforces secure authentication credentials
(PA-DSS 3.1.c and PA-DSS 3.2)
Use unique user IDs and secure authentication for administrative
access and access to cardholder data
•
Create PCI DSS-compliant complex passwords to access the payment
application, per PCI Data Security Standards 8.5.8 through 8.5.15.
•
Each user of the system must have a unique User Name and strong
password. They should not be shared among individuals. A strong password
is one which is a minimum of 7 digits long with a combination of numeric and
alpha characters. It is also required that these passwords be changed
periodically (90 days maximum or if an employee is no longer on staff) and
must not be the same as any of the 4 previous passwords used. In addition,
inactive stations (not to exceed 15 minutes) should require reentering of the
password in order to continue the session. This is facilitated by the
VisualMatrix software from the Security screen accessed from the
Management / Admin / Security tab and Management / Setup / Parameters
tab
Failure to do the above will result in non-compliance with the PCI-DSS
Additionally, if the applications’ security level is reduced via user configuration
error or failure(s) to properly configure, it could render the software into nonPCI-DSS compliant status.
37
Audit Trails and Centralized Logging
(PA-DSS 4.1, PA-DSS 4.3 and PA-DSS 4.4)
Per PA-DSS Requirements 4.2, 4.3 and 4.4 logs must be enabled, and
disabling the logs will result in non-compliance with PCI DSS.
All logs required per PA-DSS v2.0 requirements are enabled at the time of the
VisualMatrix™ software installation. VisualMatrix™ logging is configured per PCIDSS 10.2 and 10.3 as follows:
•
Implement automated assessment trails for all system components to
reconstruct the following events:
o 10.2.1 All individual user access to cardholder data
o 10.2.2 All actions taken by any individual with root or administrative
privileges
o 10.2.3 Access to all assessment trails
o 10.2.4 Invalid logical access attempts
o 10.2 5 Use of identification and authentication mechanisms
o 10.2.6 Initialization of assessment logs
o 10.2.7 Creation and deletion of system-level objects
•
Record at least the following assessment trail entries for all system
components for each event from 10.2.x:
o 10.3.1 User identification
o 10.3.2 Type of event
o 10.3.3 Date and time
o 10.3.4 Success or failure indication
o 10.3.5 Origination of event
o 10.3.6 Identity or name of affected data, system component, or
resource.
•
All logs must remain enabled. Disabling any logs per requirements 4.2, 4.3,
and 4.4 for PA-DSS v2.0 will result in non-compliance with PCI-DSS.
4.4 Provide instructions and procedures for incorporating the payment application logs
into a centralized logging server
•
All logs required per PA-DSS v2.0 requirements are enabled at the time of
the VisualMatrix™ software installation. All logs must remain enabled.
38
Disabling any logs per requirements 4.2, 4.3, and 4.4 for PA-DSS v2.0 will
result in non-compliance with PCI-DSS.
Necessary and Secure Services, Protocols, Daemons, Components, and
Dependent Software and Hardware
(PA-DSS 5.4)
PA-DSS 5.4 states that Payment Applications must only use or require the use
of necessary and secure services, protocols, daemons, components, and
dependent software and hardware, including those provided by third parties, for
any functionality required by the payment application (such as NetBIOS, file
sharing, Telnet, FTP, or others) and that these should be secured via SSH, SFTP, SSL, IPsec, or other technology.
•
VisualMatrix™ does not require any services, protocols, components, software or
hardware that originates from external connections. Therefore, firewalls can be
implemented that completely isolate the VisualMatrix Server and Client instances
on a private subnet (Please see Section below ‘Network Configuration’). Any
outbound connectivity should only be configured on an as needed basis (i.e.
Connection to Best Western VPN, etc. See also ‘Remote Updates’ below).
PCI-Compliant Wireless Settings
(PA-DSS 6.1.b and PA-DSS 6.2.b)
PA-DSS 6.1 and PA-DSS 6.2b state that if wireless is used within the payment
environment, a firewall should be installed, according to PCI DSS Requirement
1.3.8. Although the VisualMatrix™ application does not support wireless
technologies, should the merchant implement wireless access within the cardholder
data environment, the following guidelines for secure wireless settings must be
followed according to PCI Data Security Standards 1.2.3, 2.1.1, and 4.1.1, which
are stated above in the “Wireless Networking” section of this guide and are also
expanded upon here as:
PCI Data Security Standard 1.2.3
Perimeter firewalls must be installed between wireless networks and systems that
store cardholder data, and these firewalls must deny or control (if such traffic is
necessary for business purposes) any traffic from the wireless environment into the
cardholder data environment.
39
PCI Data Security Standard 2.1.1
• All wireless networks must implement strong encryption; for example,
Advanced Encryption Standard (AES-256).
• Encryption keys must be changed from default at installation, and changed
every time that a person with knowledge of the keys leaves the company or
changes positions.
• Default Simple Network Management Protocol (SNMP) community strings
on wireless devices must be changed.
• Default passwords and pass phrases on access points must be changed.
• Disable SSID broadcasts
• Firmware on wireless devices must be updated to support strong encryption
for authentication and transmission over wireless networks, such as WPA
and WPA2.
• Other security-related wireless vendor defaults apply, if appropriate.
• Mobile and employee owned computers must be protected with personal
firewall software
PCI Data Security Standard 4.1.1
• Industry best practices must be used to implement strong encryption for the
following over the wireless network in the cardholder data environment:
o Transmission of cardholder data
o Transmission of authentication data
•
Payment applications using wireless technology must facilitate the following
for use of Wired Equivalent Privacy (WEP):
o For new wireless implementations, implementing WEP has been
prohibited as of March 31, 2009.
o For current wireless implementations, using WEP is prohibited after
June 30, 2010.
It is STRONGLY recommended that all of the computers used as client terminals
for the VisualMatrix™ application be hard wired and not use wireless connections
for the internal network. If wireless must be used, wireless communications,
including authentication, must be encrypted using WPA or WPA2 following
guidance for hardening of wireless connections above.
40
Never Store Cardholder Data on Internet-Accessible Systems
(PA-DSS 9.1)
Cardholder data must not be stored on an Internet-accessible system. If utilizing a
web server, it must not be on the same server that the VisualMatrix™ software is
installed.
Both client and server computers must not be directly exposed to the internet or to
any unauthorized connections. All client computers and the database server must
exist in a private subnet. This should be accomplished by using a private network
behind a firewall with hard wiring (NOT wireless). If the Hotel is utilizing the
WebLink Web Booking Engine, the web server machine must exist within its own
subnet of the hotel’s network. Port 443 for SSL traffic must be forwarded only to the
web server machine in the DMZ subnet, and a firewall between the DMZ subnet
and private subnet must exist. The firewall must block all traffic between the DMZ
subnet and the private subnet, with the exception of allowing traffic on port 7000
(for Device Server) and the active SQL port for database traffic
PCI-Compliant Remote Access Using Two-Factor Authentication
(PA-DSS 10.2)
VisualMatrix standard installation includes RealVNC Software using AES
encryption which is only initiated by the customer during technical support sessions
with Image Technology support staff. The secure session is initiated by the
customer by entering a token generated by an Image Technology controlled
securely accessed web service. This token together with their current login
credentials are used to download a specially generated key protected session for
remote access that is only valid for 30 minutes if not used and only able to connect
to the fixed IP address that belongs to the Image Technology technical support
technician.
VisualMatrix™ does not interfere with two-factor authentication systems that require
a username & password combination and an additional authentication item such as
a smart card or pin number.
•
Client use of remote access technologies (Terminal Server, Citrix, etc.) to
access VisualMatrix™ requires the use of two-factor authentication.
•
Administrators who connect to the VisualMatrix™ application remotely must
do so within a Virtual Private Network. Access must also be authenticated
41
using a two-factor authentication mechanism (username/password and an
additional authentication item, such as a token or certificate).
Administrators who access the server remotely should also adhere to the following
guidelines:
•
•
•
•
•
•
•
•
•
•
•
Remote access passwords are changed every 90 days.
A minimum password length of at least seven characters is required.
Passwords containing both numeric and alphabetic characters are required.
New passwords that are the same as any of the last four are not allowed.
Repeated access attempts are blocked by locking out the user ID after not
more than six attempts.
The lockout duration is set to a minimum of 30 minutes or until the
administrator enables the user ID.
If a session has been idle for more than 15 minutes, the user must re-enter
the password to re-activate the terminal.
Change default settings in the remote access software (for example, change
default passwords and use unique passwords for each customer).
Allow connections only from specific (known) IP/MAC addresses.
Use strong authentication and complex passwords for logins, according to
PCI DSS Requirements 8.1, 8.3, and 8.5.8 - 8.5.15.
Enable encrypted data transmission according to PCI DSS Requirement 4.1:
o Strong encryption must be used during data transmission.
o The server can support the latest patched versions of SSL.
o HTTPS appears as a part of the browser Universal Record Locator.
o No cardholder data is required when HTTPS does not appear in the
URL.
o Transactions were observed to encrypt cardholder data during
transit.
o Only trusted SSL V3 / TLS V1 keys and certificates are accepted.
o Proper encryption strength was verified to be implemented for the
encryption methodology in use.
o For wireless networks transmitting cardholder data or connected to
the cardholder data environment, guidance on industry best
practices (for example, IEEE 802.11i) is provided to implement
strong encryption for authentication and transmission.
o Enable account lockout after a certain number of failed login
attempts according to PCI DSS Requirement 8.5.13.
42
10.3.1 Activate remote-access technologies for payment application updates only
when needed for downloads, and turn off immediately after download completes,
per PCI DSS Requirement
•
•
•
•
VisualMatrix™ software and updates are available through Image
Technology Systems secure ftp site. Access to the site is only granted to
users with the appropriate authentication credentials; which are available
only from within VisualMatrix™ automatic update software applications.
Remote-Access technologies for payment application updates should only
be active when needed. When not in use, they should be deactivated
immediately
The VisualMatrix server computer must have a firewall blocking all inbound
traffic from any public network (Internet) as indicated in the previous section.
However, it does need to have an outbound permission to the VisualMatrix
update web server (http://upgrades.visualmatrixpms.com).
The updates are stored in a password protected zip file and extracted by the
upgrade program with the password encrypted and embedded within itself
after which it is also validated with a hash key to make sure that the update
files have not been altered before using them to upgrade the system.
10.3.2 Implement and use remote access software security features if remote
access software is used to remotely access the payment application or payment
environment.
•
•
•
•
•
•
•
•
If remote access software is used to remotely access the payment application or
payment environment, all remote access security features must be enabled
Allow connections only from specific (known) IP/MAC addresses.
Use strong authentication and complex passwords for logins (see PA-DSS
Requirements 3.1.1 through 3.1.10.)
Enable encrypted data transmission according to PA-DSS Requirement 12.1.
Enable account lockout after a certain number of failed login attempts (see
PADSS Requirement 3.1.8.)
Configure the system so a remote user must establish a Virtual Private Network
(VPN) or SSH connection via a firewall before access is allowed.
Enable the logging function.
Establish customer passwords according to PA-DSS Requirements 3.1.1
through 3.1.10.
43
Data Transport Encryption
(PA-DSS 11.1)
PA-DSS 11.1 states that payment applications must implement and use SSL for
secure cardholder data transmission over public networks, in accordance with PCIDSS Requirement 4.1.
The PCI DSS requires the use of strong cryptography and encryption techniques
with at least a 256-bit encryption strength at the transport layer with a Secure
Sockets Layer (SSL v3) or Internet Protocol Security (IPsec) layer; or at the data
layer with algorithms such as RSA or Triple Data Encryption Standard (3DES) to
safeguard cardholder data during transmission over public networks (this includes
the Internet and Internet-accessible DMZ network segments).
PCI DSS requirement 4.1: Use strong cryptography and security protocols such as
SSL/Transport Layer Security (TLS) and IPsec to safeguard sensitive cardholder
•
•
Strong Cryptography and security protocols must be implemented if
accessing secured cardholder data via public networks.
The WebLink application must reside on a separate Web Server that must
also be behind a firewall that only allows inbound traffic from the internet on
port 443. The web server needs to be configured to only accept traffic using
HTTPS on port 443 with a certificate.
• VisualMatrix™ Credit Card interfaces must be implemented and configured
to use only SSL connections with associated certificates.
PCI-Compliant Use of End User Messaging Technologies
(PA-DSS 11.2)
PA-DSS 11.2 states that payment applications must implement and use an
encryption solution if PANs can be sent with end-user messaging technologies.
The VisualMatrix™ application does not, out of the box, provide the means to
send PAN through end-user messaging technology, such as instant messaging,
and chat, other than e-mail which masks all credit card numbers before
transmission.
Image Technology Systems strongly recommends not allowing the use of
Instant Messaging or Chat applications in association with the VisualMatrix™
software. If allowed, it will render the software non-compliant.
44
Non-console Administration
(PA-DSS 12.1)
PA-DSS 12.1 states that Payment Applications must implement and use Secure
Shell (SSH), Virtual Private Network (VPN), or SSL V3 / TLS V1 for encryption of
any non-console administrative access to payment application or servers in a
cardholder data environment.
There is no console access to the VisualMatrix™ application server since the only
access is achieved through the use of secure protocols such as SSH or secure
tunneling protocols such as a VPN.
The VisualMatrix™ application does not use insecure services such as NetBIOS,
file sharing, Telnet, or unencrypted FTP to manage the application (as per PCI-DSS
requirement 2.3).
Strong cryptography must be implemented and utilized (example: SSH, VPN, SSL
v3 or TLS v1.0 or better) for encryption of any non-console Administrative access to
the VisualMatrix™ application or servers within the cardholder data environment.
VPN or High Speed “Always On” Connections
(PA-DSS 12.3.9)
If computer is connected via VPN or other high-speed connection, receive remote
payment application updates via a securely configured firewall or personal firewall
per PCI DSS Requirement 1.
•
When connected via VPN or other high-speed connection, remote payment
application updates must be received via a securely configured firewall or
personal firewall per PCI-DSS requirement 1.
Please note any deviation from the above document in any way could render your
organization and/or the VisualMatrix™ software PCI-DSS non-compliant and
subject to breaches, fines, penalties and other adverse or costly consequences.
45
Installing the VisualMatrix™ Software
Installation of the VisualMatrix™ system requires (at minimum) the installation of a
VisualMatrix™ server component. Optionally, if purchased, additional client
installations may be completed.
VisualMatrix™ Server Installation
To install the VisualMatrix™ server, complete the following steps:
1. Install Microsoft Message Queuing from the Add/Remove Windows
Components control panel. Be sure to
select MSMQ Triggers as well.
2. Obtain the installation files
VMFR4_2_0.exe and
VM_OSSetup.exe from
http://tech.image-support.com. A
username and password for this
website may be obtained from the
support department at Image
Technology Systems.
3. Validate the SHA256 hash value of
the downloaded files using a tool such
as Hash Generator 3.0 from
http://securityxploded.com/hashgenerator.php. The hash value of the
downloaded files must match the hash value provided on the download site.
If the hash values of the downloaded files do not match, please contact the
technical support department at Image Technology Systems immediately
and do not open the downloaded files. If the hashes validate, proceed with
Step 3.
4. Right click on VM_OSSetup.exe and choose “Run As Administrator.” Click
on “Run Setup” and reboot when prompted.
5. After reboot, launch VMFR4_2_0.exe.
6. On the “Install Prerequisites
screen, click “Setup.”
7. Once the prerequisites are
installed, the VisualMatrix™
installer will continue. Select
“Install Server” to continue server installation.
46
8. When prompted to select a local hard drive for installation, choose the
appropriate drive. (Note, in most instances, this will be C:\)
9. Click the “Step 1: Install Database
Engine” button.
10. When Step 1 is complete, you will be
prompted to reboot. Complete a
reboot. Installation will continue
automatically after a successful
restart.
11. After restart, click the “Step 2: Install
Visual Matrix Database” button.
12. When the VisualMatrix™ database
installation is complete, you will be given an information screen containing
important information. Make note of this information, especially the server
name. The server name will
be required for client
installations.
13. Ensure that the proper folder
for client updates is shared
according to the data given on
the information screen.
14. Launch the VisualMatrix™
software, and login with the
details given on the
information screen. Navigate
to Front Office – Supervisor –
System Maintenance – Upgrade and ensure the VisualMatrix™ software
installed is the most current version. If it is not, proceed with any available
upgrades by following the instructions found in the Knowledge Base on
http://tech.image-support.com.
47
VisualMatrix™ Client Installation
To install the VisualMatrix™ client, complete the following steps:
1. Obtain the installation files VMFR4_2_0.exe and VM_OSSetup.exe from
http://tech.image-support.com. A username and password for this website
may be obtained from the support department at Image Technology
Systems.
2. Validate the hash value of the downloaded files using a tool such as Hash
Generator 3.0 from http://securityxploded.com/hashgenerator.php. The hash
value of the downloaded files must match the hash value provided on the
download site. If the hash values of the downloaded files do not match,
please contact the technical support department at Image Technology
Systems immediately and do not open the downloaded files. If the hashes
validate, proceed with Step 3.
3. Right click on VM_OSSetup.exe and choose “Run As Administrator.” Click
on “Run Setup” and reboot when
prompted.
4. After reboot, launch
VMFR4_2_0.exe.
5. On the “Install Prerequisites screen,
click “Setup.”
6. Once the prerequisites are installed,
the VisualMatrix™ installer will
continue. Select “Install Client” to
continue client installation.
7. When prompted to select a local hard drive for installation, choose the
appropriate drive. (Note, in most
instances, this will be C:\)
8. In the Server Name field, enter the
NetBIOS name of the VisualMatrix™
server. (Note: This is the server name
given when the installation of the
VisualMatrix™ server was
completed.)
9. When the VisualMatrix™ client
installation is complete, you will be
able to log into the client software.
The client software will automatically update itself from the VisualMatrix™
server.
48
Download